Modeling and Stability of PERT

Size: px
Start display at page:

Download "Modeling and Stability of PERT"

Transcription

1 Modeling Stability of PET Yueping Zhang I. SYSTEM MODEL Our modeling of PET is composed of three parts: window adjustment ED emulation queuing behavior. We start with the window dynamics. Similar to [7] we consider a single-link scenario assume the forward propagation delay from the source to the router is negligible thus the round-trip (t measured by the end-user at t is composed of backward propagation delay T p queuing delay T q (t (t i.e. (t = T p + T q ( t (t. ( Denoting by C the link s capacity by q(t the queue size at t queuing delay T q (t can be approimated by q(t (t/c. ote that delay (t in the last epression is because the queuing delay perceived by the user at t is actually eperienced by the router (t units earlier. Then window dynamics of a PET end-flow is written as: Ẇ (t = (t W (tw ( t (t ( p(t ( t (t where at t W (t is the congestion window size (t is the TT p(t is the packet dropping probability. ote that loss rate p(t in the last equation is an instantaneous value as appose to its delayed counterpart p(t (t in the TCP/ED model obtained in [7]. This is because a PET user makes its dropping decision at the end-host instead of the router. To formulate PET s emulation of the ED mechanism assume that the propagation delay T p is known to the endflow (this can be approimated by the base TT. Then upon each packet arrival the user can estimate the queuing delay by T q (t = (t T p generate the packet drop probability p(t as following: p(t = T q(t T min T ma T min p ma (3 where T min T ma are the maimum minimum thresholds of queuing delays p ma is a constant. Another component of ED emulation is the estimation of round-trip (t which is updated per-packet using a lowpass filter (LPF with weight α i.e. (t = α(t + ( α ˆ(t ( where ˆ(t is the instantaneous TT measured at t weight α =.99. Following the technique used in [7] this LPF can be approimated by the following differential equation: Ṙ(t = ln α δ ((t ˆ(t (5 where δ is the sampling interval. We net model the queuing dynamics which can be described by the following differential equation of queue size: q(t = W (t (t C (t where (t is the number of flows accessing the router at t term W (t(t/(t can be interpreted as the combined incoming rate y(t. Since T q (t = q(t (t/c we re-write the last equation in terms of queuing delay T q (t: T W (t (t(t (t q (t. (6 (t (tc Then equations (-(6 comprise the complete system model of PET. It is easy to see that this model is very similar to the TCP/ED model derived in [7]. ote that there are also some differences between the system models of PET TCP/ED. The first one is that in PET loss rate p in ( is not delayed by (t variables for computing queuing delay T q in (6 are retarded by one TT. As we have mentioned earlier this difference is because PET monitors queuing dynamics at the end-user while ED does this inside the router. The second difference is that PET uses queuing delay T q (t to determine loss probability while ED uses queue length q(t. We net study stability of PET (-(6. A. Stability esult II. STABILITY AALYSIS Similar to [7] we assume that the number of flows TT are constant in the steady state. Then the system becomes: f(w W T q p = W (tw (t p(t g(w T q = W (t (7 C where W (t = W (t. In the steady state we have W (t = W (t = W. Applying this result equating the left-h sides of (7 to zero we can derive the equilibrium point (W p Tq as follows: W = C p = C. (8 The following theorem states a sufficient condition for PET (7 to be locally stable in its stationary point. Theorem : Let L P ET K be defined as follows: p ma L P ET = K = ln α T ma T min δ (9 assume bounds + satisfy the following condition: L P ET +3 C w g ( + ( K

2 where: ( w g =. min + C +. ( Then PET modeled by (7 is locally stable for all +. Proof: To determine local stability of the system we first linearize it in the equilibrium: δẇ (t = δw (t+ W δw (t+ W p δṗ(t = δw (t + δt q (t W T q δp(t+ T q δt q (t where δw (t = W (t W δw (t = W (t W δp(t = p(t p δt q (t = T q (t T q the partial derivatives are given below: W = W p W C ( W p = C (3 T q + W p = ( W = C (5 W T q C. (6 Using approimation W (t = W (t as in [7] the linearized PET model becomes: δẇ (t δ T q (t = C δw (t C δp(t (7 C δw (t δt q(t. (8 Taking Laplace transforms of both sides of the last two equations we obtain the following transfer functions: P W (s s + C C (9 P T = C s +. ( Further notice that according to [7] the transfer function of ED emulation (3-( in PET is: C(s = L P ET s/k +. ( Combining (9-( with the delay term e s in the return path we have the following closed-loop transfer-function model of PET: L(s = P W (sp T (sc(se s C e s L P ET (s + C (s + ( s K +. ( The rest of the proof directly follows from that of [ Proposition ]. Fig... sampling interval δ (sec 3 5 number of flows Sampling interval δ as a function of the minimum number of flows ote that in addition to conditions given in Theorem the equilibrium condition p p ma is also necessary for the system to be stable. To eamine validity of this condition we infer from (8 that p = /(W. Thus condition p p ma holds if only if p ma /(W. For a stationary window size W = packets we have p ma = % which is reasonable in practice. We net investigate whether there eists a closed-form solution of condition (-(. ecalling K = ln α/δ we convert ( into the following condition on δ: δ ln α ( L P ET w +6 C 6(. (3 g This equation can be used as the guideline for choosing sampling interval δ given C +. Moreover we observe that given + C δ scales inversely proportional to. To better see this consider the following simulation where T T = ms packet size s = 5 bytes p ma =. T ma = ms T min = 5 ms α =.99. We set C = mb/s (which corresponds to pkts/s range from to 5 to see the minimum requirement of δ. As seen from Figure the minimum δ monotonically decreases reaches. seconds as goes to. We note that is the lower bound of. Thus once a stable δ is picked given certain + C stability of the system is not affected by or as long as +. B. Matlab Simulations We net eamine this stability condition using Matlab simulations. Bringing in notations (t = (t = W (t (t = ˆ q (t 3 (t = q (t the fluid model of PET (-(6 can be transformed into the following delay differential equations (DDEs: ẋ (t = L P ET (t (t ( 3 (t T min ẋ (t = C (t ( ẋ 3 (t = K 3 (t K (t where K L P ET are defined in (9. Set link capacity C = pkt/s (or mb/s with packet size 5 bytes δ =. ms = = 5 p ma =.

3 (a = ms 3 5 (b = 6 ms 3 5 (c = 7 ms Fig.. The fluid model of PET (-(6 under different delay. T ma = ms T min = 5 ms α =.99. We keep = + test stability of ( under different values of delay. For all simulations we set the initial point to be ( the unit of (t is packets that of (t 3 (t are both seconds. Start with = ms which satisfies the stability condition in Theorem. As illustrated in Figure (a the system is stable with monotonic trajectories. We then increase to 6 ms which is closer to the stability boundary but still satisfies the stability condition. As shown in Figure (b the system is stable converges to its equilibrium (8 after decaying oscillations. Finally we increase to 7 ms which is eactly on the stability boundary. As seen from Figure (c the system is unstable ehibits persistent oscillations whose amplitude increases with the value of. ote that the stability boundary derived from Theorem is not eact. Even when is within the stability region but close enough to the boundary the system becomes unstable. This discrepancy is due to the approimations W (t = W (t (t in the proof. To justify this reasoning we rewrite ( using W (t = W (t (t repeat the above simulations. The simulation results demonstrate that stability of the system is guaranteed under condition ( becomes unstable when is increased to 75 ms (which eceeds the stability boundary 7 ms. Lack of necessity of the stability condition is also pointed out in the contet of TCP/ED in []. However Theorem still serves as a general guideline for choosing PET parameters. C. Discussion We remark on two differences between Theorem [7 Proposition ]. The first one is that in the left-h side of ( we have C instead of C 3 as in [7 (8]. This is because PET uses queuing delay T q (t to determine loss probability while ED uses queue size q(t. Applying L P ET = L ED C in ( it is evident that the resulting stability condition is identical to that of ED. The second difference is that sampling interval δ in ED is approimately fied to /C while in PET δ of user i is the inter-packet arrival / i (t which is approimately /C. As a consequence for fied C the more flows are accessing the bottleneck link the slower the sampling action of each flow. eflected in the stability condition this also results in less constraint on C + than in ED. Thus both differences actually increase the stability region of PET. On the other h when the frequency of sampling action becomes etremely low TT estimation at the end user may not accurately capture the queuing dynamics inside the router. However we argue that this problem does not occur in practice since the ISP will increase link capacity as the number of accessing flows becomes large to decrease packet loss rate prevent end-flows from starving. Thus there are always sufficient packets within one TT of each flow such that the end-user has enough samples for TT estimation. In addition it is common to assume that link capacity C scales linearly with the number of flows [] i.e. C/ = σ where σ is constant. Then assuming W = = + condition (-( translates into:. L P ET σ + σ K + (5 + which is independent of C is only a function of +. This property does not hold for ED due to term C 3 instead of C in (. As a consequence sampling interval δ of ED depends on ( thus unscalable to C even if C/ is kept constant. We should also note that similar to ED sampling interval δ in PET also depends on the link capacity C packet size s. Specifically δ becomes small when C increases or s decreases becomes large otherwise. As pointed out in [7] this adaptive nature of δ is harmful since small δ results in close tracking of the instantaneous queue length thus leads to large oscillations. On the other h large δ results in increased rise etended initial overshoot of the queue length. Thus it is suggested that δ be set to a fied value that is independent of C s. As mentioned above this requirement can be easily satisfied when ratio C/ is kept constant. A detailed discussion of the impact of δ on system performance is available in [7 Section 3.]. III. EMULATIG PI It has been identified that ED has several drawbacks such as lack of significant performance improvement for pure web traffic [] mitures of FTP UDP HTTP traffic [6] difficulties in tuning ED parameters [] [3] [7] tradeoff between stability responsiveness of the system [7]. As pointed out in [5] the major cause of the last drawback

4 in the above list is the averaging mechanism of the LPF. Thus the authors suggest using the instantaneous queue length applying a PI controller to it. Simulation results in [5] demonstrate that PI offers better performance than ED in terms of stability stationary queue size. Motivated by this fact we net seek to emulate PI inside PET. The transfer function of PI is: P (s C P I (s = T q (s = K + s/m (6 s where P (s T q (s are respectively the Laplace transforms of δp(t = p(t p δt q (t = T q (t Tq K m are constants to be determined net. Assuming p = we re-write PI (6 in the -domain as follows: ( δp(t = p(t = K δt q (t + δt q (tdt. (7 m To implement the continuous PI (7 in PET we discretize it using bilinear transform s = (z /δ(z+ where δ is the sampling interval convert the s-domain transfer function given in (6 into its following counterpart in the z-domain: C P I (z = P (z T q (z = γz β z (8 where γ = K/m + Kδ/ β = K/m Kδ/. Then the -domain version of the PI controller becomes: p(t = γ(t q (t T q β(t q (t T q + p(t (9 Thus in the new version of PET the only change is to replace ED emulation (3-( with the PI controller (9. Stability condition of PET/PI defined by (7 (9 is given below. Theorem : Assume: W (3 where W is the stationary window size. Then PET/PI defined by (7 (9 with m = + C K = m j m + (3 +3 C ( is locally stable for all flow numbers all stationary TT +. Furthermore the phase margin PM satisfies: P M 9 8 π m. (3 Proof: Following Theorem [5 Proposition ] it is easy to prove that PET/PI modeled by (7 (7 with K m defined in (3 is stable. Since stability is preserved under bilinear transform stability condition of PET (7 with discrete PI (9 is the same as that of (7 (7. Similar to Theorem since PET uses queuing delay to determine loss probability in parameter K (3 we have term C instead of C 3 as in the original stability condition of TCP/PI [5 Proposition ]. In addition it is clear that this controller is easy to implement does not require a complicated tuning process of parameters such as T min T ma p ma α as in ED. IV. PET-V In this section we present modeling stability analysis of a variation of PET which we call PET-V such that the resulting protocol can fairly compete with TCP SACK. The idea is to dynamically adjust the additive increase parameter α based on PET s early dropping probability p the link s packet loss probability p. ow the combined packet loss rate p P ET eperienced by the end-user becomes p P ET = ( p ( p = p+p pp. To roughly match the throughput equations of PET non-pet TCP flows we want to equate term βp P ET /α P ET βp/α. Since α = for the regular TCP we have α P ET = p P ET /p = + p /p p. Assuming p we simplify the last equation as α P ET = + p /p. We net analyze stability of the new method. Assuming loss rate p = p at links is constant we can rewrite steady-state equations of the system as following: ( + p /p W (p + p p p = W =. (33 C Then we have the following stationary values: W = C C p p p = C p + C. (3 p Local stability of PET-V is given in the following theorem. Theorem 3: Let L P ET K be defined as follows: L P ET = p ma T ma T min K = ln α δ (35 assume bounds + satisfy the following condition: L P ET + C( p ( ( ( + C p + ( + C p ( Cp w g + (36 K where: ( Cp w g =. min ( ( + C p + ( + C p + link loss rate p is assumed to be constant. Then PET modeled by (7 is locally stable for all +. Proof: Linearizing the system in its equilibrium we have: δẇ (t = δw (t+ δw (t+ W W p δp (t+ δt q (t T q δṗ (t = δw (t + δt q (t W T q where δw (t = W (t W δw (t = W (t W δp (t = p (t p δt q (t = T q (t T q the partial

5 5 derivatives are given below: W = W (p + p p p W Cp C p + C (37 p p W ( p C ( p (38 p + p T q p + W (p + p p p = (39 W = C ( W T q C. ( Using approimation W (t = W (t as in [7] the linearized PET model becomes: δẇ (t Cp C p + C δw (t p C ( p δp (t ( δ T q (t = C δw (t δt q(t. (3 Taking Laplace transforms of both sides of the last two equations we obtain the following transfer functions: P W (s s + P T (s = C ( p ( Cp C p + C p C s +. (5 Further notice that according to [7] the transfer function of ED emulation (3-( in PET is: C(s = L P ET s/k +. (6 Combining the above equations with the delay term e s in the return path we have the following closed-loop transferfunction model of PET: L(s = P W (sp T (sc(se s (7 (s + C( p e s L P ET Cp C p + C p (s + ( s K +. The rest of the proof directly follows from that of [ Proposition ]. A. Analysis V. PET-V3 In this section we present analyze a new version of PET which we call PET-V3. In this new protocol upon the onset of congestion the end-user reducing the congestion window by a factor of β = T q (t/(t q (t + T ma instead of β = /. In other words the congestion window W (t becomes ( βw (t upon detection of a packet loss event. Thus assuming the TT (t = is constant we can write the system equations as following: f(t = Ẇ (t = T maw (tw (t p(t (8 (T q (t + T ma g(t = q(t = W (t. (9 C Combining this model with equation p(t = L P ET (T q (t T min we have: W = C (5 T q = T ma( + C L P ET T min T ma C L P ET (5 p = L P ET (T ma + T min T ma C L P ET. (5 We net attempt to study local stability of the system in its equilibrium (W p Tq. Theorem : Let: L P ET = p ma T ma T min K = ln α δ. (53 Assume bounds + satisfy the following condition: (T ma + C L P ET w C L P ET T ma (T ma + T min g + (5 K where: ( w g =. min + C +. (55 Then PET-V3 modeled by (8-(9 is locally stable for all +. Proof: We first obtain the following partial derivatives: W = W T ma W (Tq + T ma p C (56 p p (57 = T q (Tq + T ma (58 W = C (59 T q. (6 Then the linearized window dynamics of PET-V3 is given by the following differential equation: δẇ (t δw (t C p δp(t + (Tq + T ma δt q(t. (6

6 (a = 5 ms 6 8 (b = 5 ms 6 8 (c = 7 ms Fig. 3. The fluid model of PET-V3 under different delay. Further noticing that T q (t = p(t/l P ET + T min we have T q = p /L P ET + T min δp(t = p(t p = δt q (t/l P ET. Then we can rewrite (6 as: where δẇ (t δw (t + Γδp(t (6 C (T ma C L P ET Γ C L P ET T ma (T ma + T min. (63 Then the s-domain transfer function of the last equation becomes: Γ P W (s. (6 s + C The linearized equation of queuing dynamics is the same as before: δ q(t = C δw (t δt q(t (65 whose transfer function is easy to obtain: P T (s = C s +. (66 Following the previous techniques we have the following closed-loop transfer function L(s: Γ L(s = C L P ET e s (s + C (s + ( s (67 K +. The rest of the proof directly follows from [ Proposition ]. We use the same system setting as Figure that is link capacity C = pkt/sec (or mb/s with packet size 5 bytes δ =. ms = = 5 p ma =. T ma = ms T min = 5 ms α =.99. We keep = + test stability of (68 under different values of delay. For all simulations we set the initial point to be ( the unit of (t is packets that of (t 3 (t are both seconds. We start with = 5 ms which satisfies the stability condition in Theorem. As illustrated in Figure 3(a PET-V3 is stable with monotonic trajectories converges the congestion window W (t eactly to the predicted value W = 3 packets. We then increase to 5 ms which is closer to the stability boundary but still satisfies the stability condition. As shown in Figure 3(b the system is stable converges to its equilibrium W = 5 packets after decaying oscillations. Finally we increase to the stability boundary 7 ms. As seen from Figure 3(c the system is marginally stable ehibits persistent oscillations. Comparing these results to Figure we infer that under the same system configuration PET-V3 ehibits better stability properties tolerates higher delay than the original PET. In addition we also observe from simulations that PET- V3 has lower stationary queuing delay Tq dropping rate p than PET as well as preserving the steady-state congestion window W. All of these properties combined its TCP friendliness make PET-V3 a better choice than PET in practical settings. B. Simulation We net eamine this stability condition using Matlab simulations. Bringing in notations (t = T p +T q (t (t = W (t (t = ˆT q (t 3 (t = T q (t the fluid model of PET-V3 can be transformed into the following delay differential equations: ẋ (t = ẋ (t = (t L P ET (tt ma ( 3 (t (t T min (t(t q (t + T ma (tc (t (68 ẋ 3 (t = K 3 (t K (t where K L P ET are defined in (9. EFEECES [] M. Christiansen K. Jeffay D. Ott F. D. Smith Tuning ED for Web Traffic in Proc. ACM SIGCOMM Aug. pp [] A. Dhamdhere H. Jiang C. Dovrolis Buffer Sizing for Congested Internet Links in Proc. IEEE IFOCOM Mar. 5 pp [3] S. Floyd. Gummadi S. Shenker Adaptive ED: An Algorithm for Increasing the obustness of ED s Active Queue Management ICI Tech. ep. Aug.. [] C. V. Hollot V. Misra D. Towsley W.-B. Gong A Control Theoretical Analysis of ED in Proc. IEEE IFOCOM Apr. pp [5] C. V. Hollot V. Misra D. Towsley W.-B. Gong On Designing Improved Controllers for AQM outers Supporting TCP Flows in Proc. IEEE IFOCOM Apr. pp [6] M. May J. Bolot C. Diot B. Lyles easons ot to Deploy ED in Proc. IEEE IWQoS Jun. 999 pp [7] V. Misra W.-B. Gong D. Towsley A Fluid-Based Analysis of a etwork of AQM outers Supporting TCP Flows with an Application to ED in Proc. ACM SIGCOMM Aug. pp. 5 6.

Analysis and Design of Controllers for AQM Routers Supporting TCP Flows

Analysis and Design of Controllers for AQM Routers Supporting TCP Flows To appear in IEEE TAC s special issue on Systems and Control Methods for Communication Networks Analysis and Design of Controllers for AQM Routers Supporting TCP Flows C.V. Hollot, V. Misra, D. Towsley

More information

A Mathematical Model of the Skype VoIP Congestion Control Algorithm

A Mathematical Model of the Skype VoIP Congestion Control Algorithm A Mathematical Model of the Skype VoIP Congestion Control Algorithm Luca De Cicco, S. Mascolo, V. Palmisano Dipartimento di Elettrotecnica ed Elettronica, Politecnico di Bari 47th IEEE Conference on Decision

More information

Boundedness of AIMD/RED System with Time Delays

Boundedness of AIMD/RED System with Time Delays Boundedness of AIMD/ED System with Time Delays Lijun Wang 1, Lin Cai, Xinzhi Liu 1 and Xuemin (Sherman) Shen 3 Department of Applied Mathematics 1, Department of Electrical and Computer Engineering 3 University

More information

PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control

PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control Saurabh Jain Joint work with Dr. Dmitri Loguinov June 21, 2007 1 Agenda Introduction Analysis of RCP QI-RCP PIQI-RCP Comparison Wrap

More information

384Y Project June 5, Stability of Congestion Control Algorithms Using Control Theory with an application to XCP

384Y Project June 5, Stability of Congestion Control Algorithms Using Control Theory with an application to XCP 384Y Project June 5, 00 Stability of Congestion Control Algorithms Using Control Theory with an application to XCP . Introduction During recent years, a lot of work has been done towards the theoretical

More information

OSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION

OSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION International Journal of Bifurcation and Chaos, Vol. 18, No. 5 (28) 1459 1475 c World Scientific Publishing Company OSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION XI CHEN,

More information

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min JetMax: Scalable Max-Min Min Congestion Control for High- Speed Heterogeneous Networks Yueping Zhang Joint work with Derek Leonard and Dmitri Loguinov Internet Research Lab Department of Computer Science

More information

Complete Stability Region Characterization for PI-AQM

Complete Stability Region Characterization for PI-AQM Complete Stability Region Characterization for PI-AQM Ahmad T. Al-Hammouri, Vincenzo Liberatore, Michael S. ranicky Department of Electrical Engineering and Computer Science Case Western Reserve University

More information

Internet Congestion Control: Equilibrium and Dynamics

Internet Congestion Control: Equilibrium and Dynamics Internet Congestion Control: Equilibrium and Dynamics A. Kevin Tang Cornell University ISS Seminar, Princeton University, February 21, 2008 Networks and Corresponding Theories Power networks (Maxwell Theory)

More information

A New TCP/AQM System Analysis

A New TCP/AQM System Analysis A ew TCP/AQM System Analysis Qin Xu, Fan Li, Jinsheng Sun, and Moshe Zukerman, Fellow, IEEE arxiv:37.24v [cs.i] 4 Jul 23 Abstract The fluid model has been used extensively to guide designs of AQM schemes

More information

Analysis of TCP-AQM Interaction via Periodic Optimization and Linear Programming: The Case of Sigmoidal Utility Function

Analysis of TCP-AQM Interaction via Periodic Optimization and Linear Programming: The Case of Sigmoidal Utility Function Analysis of TCP-AQM Interaction via Periodic Optimization and Linear Programming: The Case of Sigmoidal Utility Function K. Avrachenkov 1, L. Finlay 2, and V. Gaitsgory 2 1 INRIA Sophia Antipolis, France

More information

Performance Modeling of TCP/AQM with Generalized AIMD under Intermediate Buffer Sizes

Performance Modeling of TCP/AQM with Generalized AIMD under Intermediate Buffer Sizes Performance Modeling of TCP/AQM with Generalized AIMD under Intermediate Buffer Sizes Do Young Eun and Xinbing Wang Dept. of Electrical and Computer Engineering orth Carolina State University Raleigh,

More information

Hopf Bifurcation and Stability of an Improved Fluid Flow Model with Time Delay in Internet Congestion Control

Hopf Bifurcation and Stability of an Improved Fluid Flow Model with Time Delay in Internet Congestion Control International Journal of Engineering esearch And Management (IJEM) ISSN: 349-58, Volume-5, Issue-6, June 18 Hopf Bifurcation and Stability of an Improved Fluid Flow Model with Time Delay in Internet Congestion

More information

TCP modeling in the presence of nonlinear window growth

TCP modeling in the presence of nonlinear window growth TCP modeling in the presence of nonlinear window growth Eitan Altman, Kostia Avrachenkov, Chadi Barakat Rudesindo Núñez-Queija Abstract We develop a model for TCP that accounts for both sublinearity and

More information

Network anomaly estimation for TCP/AQM networks using an observer

Network anomaly estimation for TCP/AQM networks using an observer 1 Network anomaly estimation for TCP/AQM networks using an observer Yassine Ariba, Yann Labit, Frederic Gouaisbaut University of Toulouse, LAAS-CNRS 7 avenue du Colonel Roche, 3177 Toulouse cedex 4 FRANCE

More information

Fairness comparison of FAST TCP and TCP Vegas

Fairness comparison of FAST TCP and TCP Vegas Fairness comparison of FAST TCP and TCP Vegas Lachlan L. H. Andrew, Liansheng Tan, Tony Cui, and Moshe Zukerman ARC Special Research Centre for Ultra-Broadband Information Networks (CUBIN), an affiliated

More information

A New Technique for Link Utilization Estimation

A New Technique for Link Utilization Estimation A New Technique for Link Utilization Estimation in Packet Data Networks using SNMP Variables S. Amarnath and Anurag Kumar* Dept. of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

Nonlinear Instabilities in TCP-RED

Nonlinear Instabilities in TCP-RED Nonlinear Instabilities in TCP-RED Priya Ranjan, Eyad H. Abed and Richard J. La Abstract This work develops a discrete time feedback system model for a simplified TCP (Transmission Control Protocol) network

More information

Abstract. This paper discusses the shape of the RED drop function necessary to confirm the requirements

Abstract. This paper discusses the shape of the RED drop function necessary to confirm the requirements On the Non-Linearity of the RED Drop Function Erich Plasser, Thomas Ziegler, Peter Reichl Telecommunications Research Center Vienna Donaucity Strasse 1, 122 Vienna, Austria plasser, ziegler, reichl @ftw.at

More information

Statistical Detection of Congestion in Routers

Statistical Detection of Congestion in Routers Submitted to IEEE/ACM Transactions on Networking Statistical Detection of Congestion in Routers Ivan D. Barrera, Member, IEEE, Stephan Bohacek, Member, IEEE, and Gonzalo Arce, Fellow, IEEE, Abstract Detection

More information

cs/ee/ids 143 Communication Networks

cs/ee/ids 143 Communication Networks cs/ee/ids 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Agenda Internetworking n Routing across LANs, layer2-layer3 n DHCP n NAT Transport layer

More information

Nonlinear Instabilities in TCP-RED

Nonlinear Instabilities in TCP-RED Nonlinear Instabilities in TCP-RED Priya Ranjan, Eyad H Abed and Richard J La Abstract This work develops a discrete time feedback system model for a simplified TCP (Transmission Control Protocol) network

More information

A Generalized FAST TCP Scheme

A Generalized FAST TCP Scheme A Generalized FAST TCP Scheme Cao Yuan a, Liansheng Tan a,b, Lachlan L. H. Andrew c, Wei Zhang a, Moshe Zukerman d,, a Department of Computer Science, Central China Normal University, Wuhan 430079, P.R.

More information

Robustness of Real and Virtual Queue based Active Queue Management Schemes

Robustness of Real and Virtual Queue based Active Queue Management Schemes Robustness of Real and Virtual Queue based Active Queue Management Schemes Ashvin Lakshmikantha, C. L. Beck and R. Srikant Department of General Engineering University of Illinois lkshmknt@uiuc.edu, rsrikant@uiuc.edu,

More information

Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems

Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems Yueping Zhang and Dmitri Loguinov Texas A&M University, College Station, TX 77843 Email: {yueping, dmitri}@cs.tamu.edu Abstract

More information

Modelling TCP with a Discrete Time Markov Chain

Modelling TCP with a Discrete Time Markov Chain Modelling TCP with a Discrete Time Markov Chain José L Gil Motorola josegil@motorola.com ABSTRACT TCP is the most widely used transport protocol in the Internet. The end-to-end performance of most Internet

More information

CS276 Homework 1: ns-2

CS276 Homework 1: ns-2 CS276 Homework 1: ns-2 Erik Peterson October 28, 2006 1 Part 1 - Fairness between TCP variants 1.1 Method After learning ns-2, I wrote a script (Listing 3) that runs a simulation of one or two tcp flows

More information

Modelling an Isolated Compound TCP Connection

Modelling an Isolated Compound TCP Connection Modelling an Isolated Compound TCP Connection Alberto Blanc and Denis Collange Orange Labs 905 rue Albert Einstein Sophia Antipolis, France {Email: alberto.blanc,denis.collange}@orange-ftgroup.com Konstantin

More information

TCP-friendly SIMD Congestion Control and Its Convergence Behavior

TCP-friendly SIMD Congestion Control and Its Convergence Behavior Boston University OpenBU Computer Science http://open.bu.edu CAS: Computer Science: Technical Reports 1-5-8 TCP-friendly SIMD Congestion Control and Its Convergence Behavior Jin, Shudong Boston University

More information

Congestion Control for Infrastructure-based CRNs: A Multiple Model Predictive Control Approach

Congestion Control for Infrastructure-based CRNs: A Multiple Model Predictive Control Approach Congestion Control for Infrastructure-based CRNs: A Multiple Model Predictive Control Approach Kefan Xiao, Shiwen Mao, and Jitendra K Tugnait Department of Electrical and Computer Engineering, Auburn University,

More information

On the Resource Utilization and Traffic Distribution of Multipath Transmission Control

On the Resource Utilization and Traffic Distribution of Multipath Transmission Control On the Resource Utilization and Traffic Distribution of Multipath Transmission Control Bo Jiang 1, Yan Cai, Don Towsley 1 1 {bjiang, towsley}@cs.umass.edu ycai@ecs.umass.edu University of Massachusetts,

More information

Fractional order PI controllers for TCP packet flow ensuring given modulus margins

Fractional order PI controllers for TCP packet flow ensuring given modulus margins Control and Cybernetics vol. 43 (2014) No. 4 Fractional order PI controllers for TCP packet flow ensuring given modulus margins by Wies law Krajewski 1 and Umberto Viaro 2 1 Systems Research Institute,

More information

Analysis of Scalable TCP in the presence of Markovian Losses

Analysis of Scalable TCP in the presence of Markovian Losses Analysis of Scalable TCP in the presence of Markovian Losses E Altman K E Avrachenkov A A Kherani BJ Prabhu INRIA Sophia Antipolis 06902 Sophia Antipolis, France Email:altman,kavratchenkov,alam,bprabhu}@sophiainriafr

More information

A conservation-law-based modular fluid-flow model for network congestion modeling

A conservation-law-based modular fluid-flow model for network congestion modeling A conservation-law-based modular fluid-flow model for network congestion modeling Corentin Briat, Emre A. Yavuz and Gunnar Karlsson arxiv:128.123v1 [cs.ni] 6 Aug 212 Abstract A modular fluid-flow model

More information

Window Size. Window Size. Window Size. Time. Time. Time

Window Size. Window Size. Window Size. Time. Time. Time A Spectrum of TCP-friendly Window-based Congestion Control Algorithms Λ Shudong Jin Liang Guo Ibrahim Matta Azer Bestavros Computer Science Department Boston University Boston, MA 5 fjins, guol, matta,

More information

Continuous-time hidden Markov models for network performance evaluation

Continuous-time hidden Markov models for network performance evaluation Performance Evaluation 49 (2002) 129 146 Continuous-time hidden Markov models for network performance evaluation Wei Wei, Bing Wang, Don Towsley Department of Computer Science, University of Massachusetts,

More information

Performance Effects of Two-way FAST TCP

Performance Effects of Two-way FAST TCP Performance Effects of Two-way FAST TCP Fei Ge a, Sammy Chan b, Lachlan L. H. Andrew c, Fan Li b, Liansheng Tan a, Moshe Zukerman b a Dept. of Computer Science, Huazhong Normal University, Wuhan, P.R.China

More information

On the Resource Utilization and Traffic Distribution of Multipath. Transmission Control

On the Resource Utilization and Traffic Distribution of Multipath. Transmission Control On the Resource Utilization and Traffic Distribution of Multipath Transmission Control UMass Computer Science Technical Report UM-CS-2011-005 Bo Jiang 1, Yan Cai 2, Don Towsley 1 1 {bjiang, towsley}@cs.umass.edu

More information

Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays.

Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays. Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays. V. Guffens 1 and G. Bastin 2 Intelligent Systems and Networks Research

More information

PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control

PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control Saurabh Jain and Dmitri Loguinov Texas A&M University, College Station, TX 77843 Email: saujain@tamu.edu, dmitri@cs.tamu.edu Abstract

More information

Research Article Design of the Congestion Control for TCP/AQM Network with Time-Delay

Research Article Design of the Congestion Control for TCP/AQM Network with Time-Delay Mathematical Problems in Engineering, Article ID 834698, 7 pages http://dx.doi.org/.55/4/834698 Research Article Design of the Congestion Control for TCP/AQM Network with Time-Delay Dazhong Wang and Shujing

More information

A Stochastic Model for TCP with Stationary Random Losses

A Stochastic Model for TCP with Stationary Random Losses A Stochastic Model for TCP with Stationary Random Losses Eitan Altman, Kostya Avrachenkov Chadi Barakat INRIA Sophia Antipolis - France ACM SIGCOMM August 31, 2000 Stockholm, Sweden Introduction Outline

More information

Robust Stability Analysis of a class of Smith Predictor-based Congestion Control algorithms for Computer Networks

Robust Stability Analysis of a class of Smith Predictor-based Congestion Control algorithms for Computer Networks Robust Stability Analysis of a class of Smith Predictor-based Congestion Control algorithms for Computer Networs Luca De Cicco, Saverio Mascolo and Silviu I. Niculescu Abstract Congestion control is a

More information

KCV Kalyanarama Sesha Sayee and Anurag Kumar

KCV Kalyanarama Sesha Sayee and Anurag Kumar Adaptive Algorithms for Admission of Elastic Sessions in the Internet KCV Kalyanarama Sesha Sayee and Anurag Kumar Abstract In the Internet, the majority of the traffic consists of elastic transfers. Users

More information

arxiv: v1 [cs.ni] 5 Feb 2009

arxiv: v1 [cs.ni] 5 Feb 2009 On Designing Lyapunov-Krasovskii Based AQM for Routers Supporting TCP Flows Yann Labit, Yassine Ariba and Frédéric Gouaisbaut arxiv:0902.0922v1 [cs.ni] 5 Feb 2009 December 2007 Abstract For the last few

More information

A Quantitative View: Delay, Throughput, Loss

A Quantitative View: Delay, Throughput, Loss A Quantitative View: Delay, Throughput, Loss Antonio Carzaniga Faculty of Informatics University of Lugano September 27, 2017 Outline Quantitative analysis of data transfer concepts for network applications

More information

Active queue management with discrete sliding modes in TCP networks

Active queue management with discrete sliding modes in TCP networks BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES, Vol. 62, No. 4, 214 DOI: 1.2478/bpasts-214-76 INFORMATICS Active queue management with discrete sliding modes in TCP networks P. IGNACIUK

More information

TCP over Cognitive Radio Channels

TCP over Cognitive Radio Channels 1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done

More information

Impact of Cross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis

Impact of Cross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis Impact of ross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis Rebecca Lovewell and Jasleen Kaur Technical Report # TR11-007 Department of omputer Science University of North arolina

More information

Performance Analysis of Priority Queueing Schemes in Internet Routers

Performance Analysis of Priority Queueing Schemes in Internet Routers Conference on Information Sciences and Systems, The Johns Hopkins University, March 8, Performance Analysis of Priority Queueing Schemes in Internet Routers Ashvin Lakshmikantha Coordinated Science Lab

More information

THE Internet is increasingly being used in the conduct of

THE Internet is increasingly being used in the conduct of 94 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 1, FEBRUARY 2006 Global Stability Conditions for Rate Control With Arbitrary Communication Delays Priya Ranjan, Member, IEEE, Richard J. La, Member,

More information

A Globally Stable Adaptive Congestion Control Scheme for Internet-Style Networks with Delay 1

A Globally Stable Adaptive Congestion Control Scheme for Internet-Style Networks with Delay 1 A Globally Stable Adaptive ongestion ontrol Scheme for Internet-Style Networks with Delay Tansu Alpcan 2 and Tamer Başar 2 (alpcan, tbasar)@control.csl.uiuc.edu Abstract In this paper, we develop, analyze

More information

Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods

Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods George Papageorgiou and John S. Baras Abstract We present an optimization problem that

More information

Models and Techniques for Network Tomography

Models and Techniques for Network Tomography Proceedings of the 21 IEEE Worshop on Information Assurance and Security T1C2 13 United States Military Academy West Point NY 5 6 June 21 Models and Techniques for Networ Tomography Stephan Bohace bohace@mathuscedu

More information

Compound TCP with Random Losses

Compound TCP with Random Losses Compound TCP with Random Losses Alberto Blanc 1, Konstantin Avrachenkov 2, Denis Collange 1, and Giovanni Neglia 2 1 Orange Labs, 905 rue Albert Einstein, 06921 Sophia Antipolis, France {alberto.blanc,denis.collange}@orange-ftgroup.com

More information

Performance Evaluation of Queuing Systems

Performance Evaluation of Queuing Systems Performance Evaluation of Queuing Systems Introduction to Queuing Systems System Performance Measures & Little s Law Equilibrium Solution of Birth-Death Processes Analysis of Single-Station Queuing Systems

More information

Understanding TCP Vegas: A Duality Model

Understanding TCP Vegas: A Duality Model Understanding TCP Vegas: A Duality Model Steven Low Departments of CS and EE, Caltech, USA slow@caltech.edu Larry Peterson Limin Wang Department of CS, Princeton University, USA {llp,lmwang}@cs.princeton.edu

More information

communication networks

communication networks Positive matrices associated with synchronised communication networks Abraham Berman Department of Mathematics Robert Shorten Hamilton Institute Douglas Leith Hamilton Instiute The Technion NUI Maynooth

More information

Stability of window-based queue control with application to mobile terminal download

Stability of window-based queue control with application to mobile terminal download Proceedings of the 17th International Symposium on Mathematical Theory of Networks and Systems, Kyoto, Japan, July 24-28, 26 TuA8.2 Stability of window-based queue control with application to mobile terminal

More information

ROBUST CONGESTION CONTROL OF TCP/IP FLOWS. Computer Control Laboratory,Groupe ESIEE, 2 Bld. Blaise Pascal, Noisy Le Grand, France

ROBUST CONGESTION CONTROL OF TCP/IP FLOWS. Computer Control Laboratory,Groupe ESIEE, 2 Bld. Blaise Pascal, Noisy Le Grand, France ROBUST CONGESTION CONTROL OF TCP/IP FLOWS A.CELA C.IONETE M. BEN GAID Computer Control Laboratory,Groupe ESIEE, 2 Bld. Blaise Pascal, 9362 Noisy Le Grand, France Abstract: The growth in the TCP/IP traffic

More information

y=5 y=1+x 2 AP Calculus Chapter 5 Testbank Part I. Multiple-Choice Questions

y=5 y=1+x 2 AP Calculus Chapter 5 Testbank Part I. Multiple-Choice Questions AP Calculus Chapter 5 Testbank Part I. Multiple-Choice Questions. Which of the following integrals correctly corresponds to the area of the shaded region in the figure to the right? (A) (B) (C) (D) (E)

More information

STABLE AND SCALABLE CONGESTION CONTROL FOR HIGH-SPEED HETEROGENEOUS NETWORKS

STABLE AND SCALABLE CONGESTION CONTROL FOR HIGH-SPEED HETEROGENEOUS NETWORKS STABLE AND SCALABLE CONGESTION CONTROL FOR HIGH-SPEED HETEROGENEOUS NETWORKS A Dissertation by YUEPING ZHANG Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of

More information

Congestion Equilibrium for Differentiated Service Classes Richard T. B. Ma

Congestion Equilibrium for Differentiated Service Classes Richard T. B. Ma Congestion Equilibrium for Differentiated Service Classes Richard T. B. Ma School of Computing National University of Singapore Allerton Conference 2011 Outline Characterize Congestion Equilibrium Modeling

More information

Delayed Stability and Performance of Distributed Congestion Control

Delayed Stability and Performance of Distributed Congestion Control Delayed Stability and Performance of Distributed Congestion Control Yueping Zhang Texas A&M University College Station, TX 77843 yueping@cs.tamu.edu Seong-Ryong Kang Texas A&M University College Station,

More information

Reliable Data Transport: Sliding Windows

Reliable Data Transport: Sliding Windows Reliable Data Transport: Sliding Windows 6.02 Fall 2013 Lecture 23 Exclusive! A Brief History of the Internet guest lecture by Prof. Hari Balakrishnan Wenesday December 4, 2013, usual 6.02 lecture time

More information

Congestion Control. Phenomenon: when too much traffic enters into system, performance degrades excessive traffic can cause congestion

Congestion Control. Phenomenon: when too much traffic enters into system, performance degrades excessive traffic can cause congestion Congestion Control Phenomenon: when too much traffic enters into system, performance degrades excessive traffic can cause congestion Problem: regulate traffic influx such that congestion does not occur

More information

Stochastic Hybrid Systems: Recent Developments and Research Trends

Stochastic Hybrid Systems: Recent Developments and Research Trends Christos G. Cassandras and John Lygeros Stochastic Hybrid Systems: Recent Developments and Research Trends CRC PRESS Boca Raton London New York Washington, D.C. Contents 1 Stochastic Hybrid Modeling of

More information

Processor Sharing Flows in the Internet

Processor Sharing Flows in the Internet STANFORD HPNG TECHNICAL REPORT TR4-HPNG4 Processor Sharing Flows in the Internet Nandita Dukkipati, Nick McKeown Computer Systems Laboratory Stanford University Stanford, CA 9434-93, USA nanditad, nickm

More information

Concise Paper: Deconstructing MPTCP Performance

Concise Paper: Deconstructing MPTCP Performance 04 IEEE nd International Conference on Network Protocols Concise Paper: Deconstructing MPTCP Performance Behnaz Arzani, Alexander Gurney, Sitian Cheng, Roch Guerin and Boon Thau Loo University Of Pennsylvania

More information

class class ff ff (t) packet loss packet loss (t) - - RED controlled queue Figure : Illustration of a Differentiad Services framework. RED has been an

class class ff ff (t) packet loss packet loss (t) - - RED controlled queue Figure : Illustration of a Differentiad Services framework. RED has been an Modeling RED with Two Traffic Classes P. Kuusela and J. T. Virtamo Laboratory of Telecommunications Technology Helsinki University of Technology P. O. Box 3000, FIN-005 HUT, Finland Email: fpirkko.kuusela,

More information

A New TCP End-to-End Congestion Avoidance Algorithm Through Output Feedback

A New TCP End-to-End Congestion Avoidance Algorithm Through Output Feedback 2004 5th Asian Control Conference A New TCP End-to-End Congestion Avoidance Algorithm Through Output Feedback Yi Guo*, Zhihua &U* and Nageswara bot * Department of Electrical and Computer Engineering University

More information

Markovian Model of Internetworking Flow Control

Markovian Model of Internetworking Flow Control Информационные процессы, Том 2, 2, 2002, стр. 149 154. c 2002 Bogoiavlenskaia. KALASHNIKOV MEMORIAL SEMINAR Markovian Model of Internetworking Flow Control O. Bogoiavlenskaia Petrozavodsk State University

More information

Mice and Elephants Visualization of Internet

Mice and Elephants Visualization of Internet Mice and Elephants Visualization of Internet Traffic J. S. Marron, Felix Hernandez-Campos 2 and F. D. Smith 2 School of Operations Research and Industrial Engineering, Cornell University, Ithaca, NY, 4853,

More information

7.2 Controller tuning from specified characteristic polynomial

7.2 Controller tuning from specified characteristic polynomial 192 Finn Haugen: PID Control 7.2 Controller tuning from specified characteristic polynomial 7.2.1 Introduction The subsequent sections explain controller tuning based on specifications of the characteristic

More information

A flow-based model for Internet backbone traffic

A flow-based model for Internet backbone traffic A flow-based model for Internet backbone traffic Chadi Barakat, Patrick Thiran Gianluca Iannaccone, Christophe iot Philippe Owezarski ICA - SC - EPFL Sprint Labs LAAS-CNRS {Chadi.Barakat,Patrick.Thiran}@epfl.ch

More information

Stochastic Network Calculus

Stochastic Network Calculus Stochastic Network Calculus Assessing the Performance of the Future Internet Markus Fidler joint work with Amr Rizk Institute of Communications Technology Leibniz Universität Hannover April 22, 2010 c

More information

Modeling Impact of Delay Spikes on TCP Performance on a Low Bandwidth Link

Modeling Impact of Delay Spikes on TCP Performance on a Low Bandwidth Link Modeling Impact of Delay Spikes on TCP Performance on a Low Bandwidth Link Pasi Lassila and Pirkko Kuusela Networking Laboratory Helsinki University of Technology (HUT) Espoo, Finland Email: {Pasi.Lassila,Pirkko.Kuusela

More information

Stability Analysis of TCP/RED Communication Algorithms

Stability Analysis of TCP/RED Communication Algorithms Stability Analysis of TCP/RED Communication Algorithms Ljiljana Trajković Simon Fraser University, Vancouver, Canada ljilja@cs.sfu.ca http://www.ensc.sfu.ca/~ljilja Collaborators Mingjian Liu and Hui Zhang

More information

Transient Behaviors of TCP-friendly Congestion Control Protocols

Transient Behaviors of TCP-friendly Congestion Control Protocols Abbreviated version in Proceedings of IEEE INFOCOM 21, April 21. Transient Behaviors of -friendly Congestion Control Protocols Y. Richard Yang, Min Sik Kim, Simon S. Lam Department of Computer Sciences

More information

Stability Analysis of TCP/RED Communication Algorithms

Stability Analysis of TCP/RED Communication Algorithms Stability Analysis of TCP/RED Communication Algorithms Ljiljana Trajković Simon Fraser University, Vancouver, Canada ljilja@cs.sfu.ca http://www.ensc.sfu.ca/~ljilja Collaborators Mingjian Liu and Hui Zhang

More information

Congestion Control In The Internet Part 1: Theory. JY Le Boudec 2018

Congestion Control In The Internet Part 1: Theory. JY Le Boudec 2018 Congestion Control In The Internet Part 1: Theory JY Le Boudec 2018 1 Contents 1. What is the problem; congestion collapse 2. Efficiency versus Fairness 3. Definitions of fairness 4. Additive Increase

More information

Enhance & Explore: an Adaptive Algorithm to Maximize the Utility of Wireless Networks

Enhance & Explore: an Adaptive Algorithm to Maximize the Utility of Wireless Networks Enhance & Explore: an Adaptive Algorithm to Maximize the Utility of Wireless Networks Julien Herzen joint work with Adel Aziz, Ruben Merz, Seva Shneer and Patrick Thiran September 5th, 2011 1/20 Context

More information

Extended Analysis of Binary Adjustment Algorithms

Extended Analysis of Binary Adjustment Algorithms 1 Extended Analysis of Binary Adjustment Algorithms Sergey Gorinsky Harrick Vin Technical Report TR22-39 Department of Computer Sciences The University of Texas at Austin Taylor Hall 2.124, Austin, TX

More information

ACK-Clocking Dynamics: Modelling the Interaction between Windows and the Network

ACK-Clocking Dynamics: Modelling the Interaction between Windows and the Network ACK-Clocking Dynamics: Modelling the Interaction between Windows and the Network Krister Jacobsson, Lachlan L. H. Andrew,AoTang, Karl H. Johansson,Håkan Hjalmarsson,StevenH.Low ACCESS Linnaeus Centre,

More information

Characterizing Adaptive Video Streaming Control Systems

Characterizing Adaptive Video Streaming Control Systems Characterizing Adaptive Video Streaming Control Systems Giuseppe Cofano, Luca De Cicco, Saverio Mascolo Abstract Adaptive video streaming systems aim at providing the best user experience given the user

More information

Methodology for Computer Science Research Lecture 4: Mathematical Modeling

Methodology for Computer Science Research Lecture 4: Mathematical Modeling Methodology for Computer Science Research Andrey Lukyanenko Department of Computer Science and Engineering Aalto University, School of Science and Technology andrey.lukyanenko@tkk.fi Definitions and Goals

More information

Queue Dynamics with Window Flow Control

Queue Dynamics with Window Flow Control 1 Queue Dynamics with Window Flow Control Ao Tang, Lachlan L. H. Andrew, Krister Jacobsson, Karl H. Johansson, Håkan Hjalmarsson, Steven H. Low Abstract This paper develops a new model that describes the

More information

Measurements made for web data, media (IP Radio and TV, BBC Iplayer: Port 80 TCP) and VoIP (Skype: Port UDP) traffic.

Measurements made for web data, media (IP Radio and TV, BBC Iplayer: Port 80 TCP) and VoIP (Skype: Port UDP) traffic. Real time statistical measurements of IPT(Inter-Packet time) of network traffic were done by designing and coding of efficient measurement tools based on the Libpcap package. Traditional Approach of measuring

More information

COMP9334: Capacity Planning of Computer Systems and Networks

COMP9334: Capacity Planning of Computer Systems and Networks COMP9334: Capacity Planning of Computer Systems and Networks Week 2: Operational analysis Lecturer: Prof. Sanjay Jha NETWORKS RESEARCH GROUP, CSE, UNSW Operational analysis Operational: Collect performance

More information

Comparison of TCP Reno and TCP Vegas via Fluid Approximation

Comparison of TCP Reno and TCP Vegas via Fluid Approximation INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Comparison of TCP Reno and TCP Vegas via Fluid Approximation Thomas Bonald N 3563 Novembre 1998 THÈME 1 apport de recherche ISSN 0249-6399

More information

8 Autonomous first order ODE

8 Autonomous first order ODE 8 Autonomous first order ODE There are different ways to approach differential equations. Prior to this lecture we mostly dealt with analytical methods, i.e., with methods that require a formula as a final

More information

MA 266 Review Topics - Exam # 2 (updated)

MA 266 Review Topics - Exam # 2 (updated) MA 66 Reiew Topics - Exam # updated Spring First Order Differential Equations Separable, st Order Linear, Homogeneous, Exact Second Order Linear Homogeneous with Equations Constant Coefficients The differential

More information

PROBLEMS In each of Problems 1 through 12:

PROBLEMS In each of Problems 1 through 12: 6.5 Impulse Functions 33 which is the formal solution of the given problem. It is also possible to write y in the form 0, t < 5, y = 5 e (t 5/ sin 5 (t 5, t 5. ( The graph of Eq. ( is shown in Figure 6.5.3.

More information

A Measurement-Analytic Approach for QoS Estimation in a Network Based on the Dominant Time Scale

A Measurement-Analytic Approach for QoS Estimation in a Network Based on the Dominant Time Scale 222 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 2, APRIL 2003 A Measurement-Analytic Approach for QoS Estimation in a Network Based on the Dominant Time Scale Do Young Eun and Ness B. Shroff, Senior

More information

IN THIS PAPER, we describe a design oriented modelling

IN THIS PAPER, we describe a design oriented modelling 616 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 14, NO 3, JUNE 2006 A Positive Systems Model of TCP-Like Congestion Control: Asymptotic Results Robert Shorten, Fabian Wirth, and Douglas Leith Abstract We

More information

Capacity management for packet-switched networks with heterogeneous sources. Linda de Jonge. Master Thesis July 29, 2009.

Capacity management for packet-switched networks with heterogeneous sources. Linda de Jonge. Master Thesis July 29, 2009. Capacity management for packet-switched networks with heterogeneous sources Linda de Jonge Master Thesis July 29, 2009 Supervisors Dr. Frank Roijers Prof. dr. ir. Sem Borst Dr. Andreas Löpker Industrial

More information

Wireless Internet Exercises

Wireless Internet Exercises Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC

More information

Unresponsive Flows and AQM Performance

Unresponsive Flows and AQM Performance Unresponsive Flows and AQM Performance C.V. Hollot, Yong Liu, Vishal Misra and Don Towsley Abstract Routers handle data packets from sources unresponsive to TCP s congestion avoidance feedback. We are

More information

Modelling multi-path problems

Modelling multi-path problems 1 Modelling multi-path problems Richard Gibbens Computer Laboratory, University of Cambridge 2nd Annual Conference on Information Sciences and Systems Princeton University 19 21 March 2 2 Multi-path flow

More information

The Fundamental Theorem of Calculus Part 3

The Fundamental Theorem of Calculus Part 3 The Fundamental Theorem of Calculus Part FTC Part Worksheet 5: Basic Rules, Initial Value Problems, Rewriting Integrands A. It s time to find anti-derivatives algebraically. Instead of saying the anti-derivative

More information